• thejml@lemm.ee
    link
    fedilink
    English
    arrow-up
    25
    ·
    1 year ago

    Either that or merging the ad into the video stream itself. This would make it un-skippable, but would also be unblockable without stream processing (there are commercial skip options for ffmpeg and similar encoders, so not completely impossible, but much more work and more likely to mark real content as a commercial as well).

    • Car@lemmy.dbzer0.com
      link
      fedilink
      arrow-up
      24
      ·
      1 year ago

      Thankfully it seems that encoding ads into the video stream is still too expensive for them to implement.

      I’m assuming that asking CDNs to combine individualized ads with content and push the unique streams to hosts does not scale well.

      • lemmyvore@feddit.nl
        link
        fedilink
        English
        arrow-up
        1
        ·
        1 year ago

        It’s not that expensive. You can mix or overlay stuff over a video stream fairly cheaply. Sure, it will be a hit overall for their bottom line but they’ll do it if they have to.

        They can also turn on DRM for all videos on the platform. Currently it’s only used for paid videos and it’s very hard to bypass.

    • thingsiplay@kbin.social
      link
      fedilink
      arrow-up
      17
      ·
      1 year ago

      or merging the ad into the video stream itself. This would make it un-skippable

      That’s not true. Besides the point that people can skip any video content manually anyway, I already use a Firefox addon called “SponsorBlock for YouTube - Skip sponsorships”, which is configurable and works for other sites as well. The skip points are community maintained, but with the help of AI it should be easy to detect ads automatically. The point is, there are already tools to help with skipping video encoded content.

      • lemmyvore@feddit.nl
        link
        fedilink
        English
        arrow-up
        8
        ·
        1 year ago

        There’s nothing to skip if they overlay small ads while the content is playing.

        On the bright side such small ads may be less annoying than full screen ads.

    • jet@hackertalks.com
      link
      fedilink
      English
      arrow-up
      13
      ·
      1 year ago

      Sponsor block demonstrates one approach to this. If everybody has the ad at the same time stamps, sponsor block would just work out of the box.

      If they got creative and introduced different time stamps for the advertisements for different people, then we could do something like MD5 hash of different video payloads, and look for the MD5 hash that isn’t distributed to everybody, mark that as an advertisement

      • aksdb@feddit.de
        link
        fedilink
        arrow-up
        3
        ·
        1 year ago

        Theoretically they could deny serving byte ranges before the end-of-ad mark until those bytes have been served and a plausible time (the duration of the ad) has passed. Practically this is likely more expensive than what the ad revenue would yield.

        • jet@hackertalks.com
          link
          fedilink
          English
          arrow-up
          3
          ·
          1 year ago

          Sure, but then you just need a youtube front running cache that preloads videos, or load multiple videos at the same time… i know i’m not the only person who watches youtube at 3x speed, so you could speed up past the ad, etc.

          • Amju Wolf@pawb.social
            link
            fedilink
            arrow-up
            1
            ·
            1 year ago

            They could use stream encryption (DRM) to ensure you’re viewing the ads as expected and make it hard to capture and playback.

            • jet@hackertalks.com
              link
              fedilink
              English
              arrow-up
              4
              ·
              edit-2
              1 year ago

              Its a arms race, you could always just record the screen with a camera and edit it out as the ultimate.

              you could spin up a vm, and capture the video output

              you could use a graphics driver that lets you inspect the frame buffer, etc

              you could use the side channel attacks to get the decrypted video frames, heartbleed etc, etc etc

              • Amju Wolf@pawb.social
                link
                fedilink
                arrow-up
                1
                ·
                1 year ago

                Do these actually work against HDCP? (Outside using a camera, obviously). I know it used to work decently well against most “ordinary” attacks like VMs and capture cards.

                • jet@hackertalks.com
                  link
                  fedilink
                  English
                  arrow-up
                  1
                  ·
                  edit-2
                  1 year ago

                  I believe HDCP keys have already been leaked, I can find a couple different references to them on GitHub even.